Mageia 2020-0193: dolphin-emu security update
Summary
Updated dolphin-emu package fixes security vulnerabilities
Dolphin Emulator includes a modified copy of the SoundTouch library at
version 1.9.2. That version is subject to the following security issues:
- The TDStretch::processSamples function in source/SoundTouch/TDStretch.cpp
in SoundTouch 1.9.2 allows remote attackers to cause a denial of service
(infinite loop and CPU consumption) via a crafted wav file (CVE-2017-9258)
- The TDStretch::acceptNewOverlapLength function in source/SoundTouch/
TDStretch.cpp in SoundTouch 1.9.2 allows remote attackers to cause a
denial of service (memory allocation error and application crash) via a
crafted wav file (CVE-2017-9259).
- The TDStretchSSE::calcCrossCorr function in source/SoundTouch/
sse_optimized.cpp in SoundTouch 1.9.2 allows remote attackers to cause a
denial of service (heap-based buffer over-read and application crash) via
a crafted wav file (CVE-2017-9260).
- Reachable assertion in RateTransposer::setChannels() causing denial of
service (CVE-2018-14044).
- Reachable assertion in FIRFilter.cpp causing denial of service
(CVE-2018-14045).
- Assertion failure in BPMDetect class in BPMDetect.cpp (CVE-2018-17096).
- Out-of-bounds heap write in WavOutFile::write() (CVE-2018-17097).
- Heap corruption in WavFileBase class in WavFile.cpp (CVE-2018-17098).
- Heap-based buffer overflow in SoundStretch/WavFile.cpp:WavInFile
::readHeaderBlock() potentially leading to code execution
(CVE-2018-1000223).
The bundled copy of SoundTouch was updated to version 2.1.2, thereby solving
theses issues in Dolphin Emulator.
References
- https://bugs.mageia.org/show_bug.cgi?id=26555
- http://advisories.mageia.org/MGASA-2018-0331.html
- http://advisories.mageia.org/MGASA-2018-0385.html
- http://advisories.mageia.org/MGASA-2018-0462.html
- https://github.com/dolphin-emu/dolphin/pull/8725
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9258
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9259
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9260
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14044
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14045
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17096
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000223
- https://cve.mitre.org/cgi-bin/cvename.cgi?name
Resolution
MGASA-2020-0193 - Updated dolphin-emu packages fix security vulnerability
SRPMS
- 7/tainted/dolphin-emu-5.0.11824-1.mga7.tainted